Insititutional, Political(legislative) & Social DiscourseOnline Child Protection - VulnerabilitiesTechnological PerspectiveCommercial Perspective & TraffickingAnalysis of Offenders“They’re flooding the internet”: A cross-national analysis of newspaper representations of the ‘internet predator’ in Australia, Canada, the UK and USA“They’re flooding the internet”: A cross-national analysis of newspaper representations of the ‘internet predator’ in Australia, Canada, the UK and USATechnology And Child Sex Trafficking: A Comparative Study Of The United States, Venezuela, And The PhilippinesTechnology And Child Sex Trafficking: A Comparative Study Of The United States, Venezuela, And The PhilippinesInternet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A ReviewInternet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A ReviewFighting Fire with Fire: Technology in Child Sex TraffickingFighting Fire with Fire: Technology in Child Sex TraffickingThe Enemy in the Screen: a Collective Case Study on Perpetrators of Internet Crimes Against ChildrenThe Enemy in the Screen: a Collective Case Study on Perpetrators of Internet Crimes Against ChildrenOnline Child Sexual Abuse: The French ResponseOnline Child Sexual Abuse: The French ResponseRhetorical moves and identity performance in online child sexual abuse interactionsRhetorical moves and identity performance in online child sexual abuse interactionsDetecting child grooming behaviour patterns on social mediaDetecting child grooming behaviour patterns on social mediaMyspace, Yourspace, But Not Theirspace: The Constitutionality of Banning Sex Offenders From Social Networking SitesMyspace, Yourspace, But Not Theirspace: The Constitutionality of Banning Sex Offenders From Social Networking SitesPunishing Sexual FantasyPunishing Sexual FantasyLegal Aspects of Sweetie 2.0Legal Aspects of Sweetie 2.0A Unique Approach Against Child Sex Offenders: Jefferson County Cheezo Unit the Model for Success?A Unique Approach Against Child Sex Offenders: Jefferson County Cheezo Unit the Model for Success?The phenomenon of online live-streaming of child sexual abuse: Challenges and legal responsesThe phenomenon of online live-streaming of child sexual abuse: Challenges and legal responsesThe Phenomenon of Online Live-Streaming of Child Sexual Abuse: Challenges and Legal ResponsesThe Phenomenon of Online Live-Streaming of Child Sexual Abuse: Challenges and Legal ResponsesYouth at Risk: Part 1, 2012 Massachusetts Family Impact SeminarYouth at Risk: Part 1, 2012 Massachusetts Family Impact SeminarGuidelines for Parents, Guardians and Educators on Child Online ProtectionGuidelines for Parents, Guardians and Educators on Child Online ProtectionThe Online Sex StingThe Online Sex StingA systematic review of fantasy driven vs. contact driven internet-initiated sexual offences: Discrete or overlapping typologies?A systematic review of fantasy driven vs. contact driven internet-initiated sexual offences: Discrete or overlapping typologies?Learning about online sexual harmLearning about online sexual harmInternet child sexual abuseInternet child sexual abuseOnline sexual grooming: the role of offender motivation and grooming strategiesOnline sexual grooming: the role of offender motivation and grooming strategiesThe Cyber Crime and Internet and Internet Sexual Exploitation of ChildrenThe Cyber Crime and Internet and Internet Sexual Exploitation of ChildrenJail for Juvenile Child Pornographers?: A Reply to Professor LearyJail for Juvenile Child Pornographers?: A Reply to Professor LearyOnline Child Sex Solicitation: Exploring the feasibility of a research ‘sting’Online Child Sex Solicitation: Exploring the feasibility of a research ‘sting’Trends in Arrests of Online Predators .Trends in Arrests of Online Predators .The grooming process and the defence of consent in child sexual abuse casesThe grooming process and the defence of consent in child sexual abuse casesCharacterizing Pedophile Conversations on the Internet using Online GroomingCharacterizing Pedophile Conversations on the Internet using Online GroomingAspects of internet security - identity management and online child protectionAspects of internet security - identity management and online child protectionPolicing online child sexual abuse - the British experiencePolicing online child sexual abuse - the British experienceAn exploration of young people’s vulnerabilities to online grooming and sexual abuseAn exploration of young people’s vulnerabilities to online grooming and sexual abuseAspects of internet security: identity management and online child protectionAspects of internet security: identity management and online child protectionChild exploitation and online protection centre (ceop) : the way forwardChild exploitation and online protection centre (ceop) : the way forwardThe role of inhibitory control in defining typologies of internet sex offendersThe role of inhibitory control in defining typologies of internet sex offendersA scoping review and gap analysis of interventions for perpetrators of online child sexual exploitationA scoping review and gap analysis of interventions for perpetrators of online child sexual exploitationProtection and Security in a Technologically Advanced Society: Children and Young People’s PerspectivesProtection and Security in a Technologically Advanced Society: Children and Young People’s PerspectivesOnline sex offending: approaches to assessment and intervention [introduction to the special issue]Online sex offending: approaches to assessment and intervention [introduction to the special issue]Online child sexual abuse by female offenders: an exploratory studyOnline child sexual abuse by female offenders: an exploratory studyAn exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors onlineAn exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors onlineOnline child sexual exploitation:prevalence, process, and offender characteristicsOnline child sexual exploitation:prevalence, process, and offender characteristicsOnline child sexual exploitation:prevalence, process, and offender characteristicsOnline child sexual exploitation:prevalence, process, and offender characteristicsOnline sexual grooming: children as victims of online abuseOnline sexual grooming: children as victims of online abuseA Dark Side of Computing and Information Sciences: Characteristics of Online GroomersA Dark Side of Computing and Information Sciences: Characteristics of Online GroomersA Dark Side of Computing and Information Sciences: Characteristics of Online GroomersA Dark Side of Computing and Information Sciences: Characteristics of Online GroomersInternational and internet child sexual abuse and exploitationInternational and internet child sexual abuse and exploitationExploring the Online Communicative Themes of Child Sex OffendersExploring the Online Communicative Themes of Child Sex OffendersInternet Facilitated Rape: A Multivariate Model of Offense BehaviorInternet Facilitated Rape: A Multivariate Model of Offense BehaviorAn exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors onlineAn exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors onlineRapid Evidence Assessment:Characteristics and vulnerabilities of victims of online-facilitated child sexual abuse and exploitationRapid Evidence Assessment:Characteristics and vulnerabilities of victims of online-facilitated child sexual abuse and exploitationTransnational Child Sexual Abuse: Outcomes from a Roundtable DiscussionTransnational Child Sexual Abuse: Outcomes from a Roundtable DiscussionInternet Facilitated Rape: A Multivariate Model of Offense Behavior.Internet Facilitated Rape: A Multivariate Model of Offense Behavior.Internet Facilitated Rape: A Multivariate Model of Offense BehaviorInternet Facilitated Rape: A Multivariate Model of Offense BehaviorFantasy depictions of child sexual abuse: The problem of ageplay in Second LifeFantasy depictions of child sexual abuse: The problem of ageplay in Second LifeDeterrence of online child sexual abuse and exploitationDeterrence of online child sexual abuse and exploitationA/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes a Hard Line against Child Predators in United States v. TykarskyA/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes a Hard Line against Child Predators in United States v. TykarskyOnline Victimization of Youth : Five Years Later.Online Victimization of Youth : Five Years Later.Online Grooming: An Exploration into the Genetic-Social Variables which Enable VictimisationOnline Grooming: An Exploration into the Genetic-Social Variables which Enable VictimisationBest practice in the management of online sex offendingBest practice in the management of online sex offendingExploring the Online Communicative Themes of Child Sex OffendersExploring the Online Communicative Themes of Child Sex OffendersOnline risks and childrenOnline risks and childrenThe internet and sexual offending: an international perspectiveThe internet and sexual offending: an international perspectiveA criminological analysis : using real-time monitoring to gather data on online predatorsA criminological analysis : using real-time monitoring to gather data on online predatorsProtecting Children in CyberspaceProtecting Children in CyberspaceA criminological analysis : using real-time monitoring to gather data on online predatorsA criminological analysis : using real-time monitoring to gather data on online predatorsBritish newspaper coverage of child sexual abuse : relating news to policy and social discoursesBritish newspaper coverage of child sexual abuse : relating news to policy and social discoursesOnline Sexual Solicitation of Minors: How Often and between Whom Does It Occur?Online Sexual Solicitation of Minors: How Often and between Whom Does It Occur?A qualitative analysis of offenders' modus operandi in sexually exploitative interactions with children onlineA qualitative analysis of offenders' modus operandi in sexually exploitative interactions with children onlineInternet-Facilitated Commercial Sexual Exploitation of Children.Internet-Facilitated Commercial Sexual Exploitation of Children.Detecting psycho-anomalies on the world-wide web: current tools and challengesDetecting psycho-anomalies on the world-wide web: current tools and challengesMale Child Victim of Sexual Abuse in NigeriaMale Child Victim of Sexual Abuse in NigeriaHistorical review of sexual offence and child sexual abuse legislation in Australia: 1788–2013Historical review of sexual offence and child sexual abuse legislation in Australia: 1788–2013Myspace, but Whose Responsibility - Liability of Social-Networking Websites When Offline Sexual Assault of Minors Follows Online InteractionMyspace, but Whose Responsibility - Liability of Social-Networking Websites When Offline Sexual Assault of Minors Follows Online InteractionFlorida Teacher Perceptions Concerning Internet Dangers For StudentsFlorida Teacher Perceptions Concerning Internet Dangers For StudentsProtecting Children Online: Exploring the Impact of an Online Identifier for Registered Sex Offenders on Adult Internet Users’ Online Information Sharing BehaviorsProtecting Children Online: Exploring the Impact of an Online Identifier for Registered Sex Offenders on Adult Internet Users’ Online Information Sharing BehaviorsLegislative models of prosecuting child sexual abuse in India: A review and critical analysisLegislative models of prosecuting child sexual abuse in India: A review and critical analysisPrimary prevention of child sexual abuse: Child focused interventionsPrimary prevention of child sexual abuse: Child focused interventionsBest practice in the management of online sex offendingBest practice in the management of online sex offendingAverage Teenager or Sex Offender? Solutions to the Legal Dilemma Caused by Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009)Average Teenager or Sex Offender? Solutions to the Legal Dilemma Caused by Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009)Protecting children from sex offenders online: when strangers become 'virtual friends'Protecting children from sex offenders online: when strangers become 'virtual friends'London guidelines for assessing children and families affected by adults viewing child sexual abuse images on the internetLondon guidelines for assessing children and families affected by adults viewing child sexual abuse images on the internetMisperceptions about child sex offendersMisperceptions about child sex offendersThe Sexual Exploitation of Children: A Guide to the Empirical LiteratureThe Sexual Exploitation of Children: A Guide to the Empirical LiteratureYoung Adult Perceptions of Internet Communications and the Grooming ConceptYoung Adult Perceptions of Internet Communications and the Grooming ConceptOffense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication PlatformsOffense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication PlatformsOnline sexual grooming : a cross-cultural perspective on online child grooming victimizationOnline sexual grooming : a cross-cultural perspective on online child grooming victimizationThe impact of Self-Generated Images in online pornographyThe impact of Self-Generated Images in online pornographyThe Role of Sexual Images in Online and Offline Sexual Behavior with Minors.The Role of Sexual Images in Online and Offline Sexual Behavior with Minors.Offense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication PlatformsOffense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication PlatformsOffense Processes of Online Sexual Grooming and Abuse of Children via Internet Communication PlatformsOffense Processes of Online Sexual Grooming and Abuse of Children via Internet Communication Platformse-Youth: (future) policy implications: reflections on online risk, harm and vulnerabilitye-Youth: (future) policy implications: reflections on online risk, harm and vulnerabilityComparing adult-youth and adult-adult online sexual solicitation: Manipulative behaviors, situational factors, and outcomesComparing adult-youth and adult-adult online sexual solicitation: Manipulative behaviors, situational factors, and outcomes“Under his spell”:victims’ perspectives of being groomed online“Under his spell”:victims’ perspectives of being groomed onlineThe Use of New Communications and Information Technologies for Sexual Exploitation of Women and ChildrenThe Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children“Under his spell”:victims’ perspectives of being groomed online“Under his spell”:victims’ perspectives of being groomed onlineThe Use of New Communications and Information Technologies for Sexual Exploitation of Women and ChildrenThe Use of New Communications and Information Technologies for Sexual Exploitation of Women and ChildrenProtecting Children in CyberspaceProtecting Children in CyberspaceSexting and Teenagers: OMG R U Going 2 Jail???Sexting and Teenagers: OMG R U Going 2 Jail???Kerja Sama Interpol – Britania Raya dalam Memerangi Kejahatan Siber: Studi Kasus Peningkatan Online Child Sexual Abuse di Britania RayaKerja Sama Interpol – Britania Raya dalam Memerangi Kejahatan Siber: Studi Kasus Peningkatan Online Child Sexual Abuse di Britania RayaDoe v. KIKDoe v. KIKGrowth and change in undercover online child exploitation investigations, 2000–2006Growth and change in undercover online child exploitation investigations, 2000–2006Protecting Children in CyberspaceProtecting Children in CyberspaceIs talking online to unknown people always risky? Distinguishing online interaction styles in a national sample of youth Internet users.Is talking online to unknown people always risky? Distinguishing online interaction styles in a national sample of youth Internet users.Over the Internet, Under the Radar : Prevention of Online Child Sexual Abuse and Exploitation in ScotlandOver the Internet, Under the Radar : Prevention of Online Child Sexual Abuse and Exploitation in ScotlandChild Sexual Abuse in the Eastern Caribbean: The report of a study carried out across the Eastern Caribbean during the period October 2008 to June 2009Child Sexual Abuse in the Eastern Caribbean: The report of a study carried out across the Eastern Caribbean during the period October 2008 to June 2009Internet regulation of harmful content affecting childrenInternet regulation of harmful content affecting childrenProtecting Children in CyberspaceProtecting Children in CyberspaceA review of online grooming:characteristics and concernsA review of online grooming:characteristics and concernsPsychosocial Variables Common among Child Victims of Sex TraffickingPsychosocial Variables Common among Child Victims of Sex TraffickingThe online social network era: are the children protected in Malaysia?The online social network era: are the children protected in Malaysia?A review of online grooming:characteristics and concernsA review of online grooming:characteristics and concernsExploring online sexual extortion in ScotlandExploring online sexual extortion in ScotlandDeceptive identity performance:Offender moves and multiple identities in online child abuse conversationsDeceptive identity performance:Offender moves and multiple identities in online child abuse conversationsThis doesn\u27t happen here : Child sex trafficking in rural OklahomaThis doesn\u27t happen here : Child sex trafficking in rural OklahomaProtecting Children from Online Exploitation and Abuse: An Overview of Project Safe ChildhoodProtecting Children from Online Exploitation and Abuse: An Overview of Project Safe ChildhoodExploring online sexual extortion in ScotlandExploring online sexual extortion in ScotlandOffenders who use child sexual exploitation material: Development of an integrated model for their classification, assessment, and treatmentOffenders who use child sexual exploitation material: Development of an integrated model for their classification, assessment, and treatmentA comparison of victim and offender perspectives of grooming and sexual abuseA comparison of victim and offender perspectives of grooming and sexual abuseExploring the Extent to Which the Utilization of Technology Has Facilitated the Increased Possession of Online Child Pornography over TimeExploring the Extent to Which the Utilization of Technology Has Facilitated the Increased Possession of Online Child Pornography over TimeResearching online child sexual exploitation and abuse: are there links between online and offline vulnerabilities?Researching online child sexual exploitation and abuse: are there links between online and offline vulnerabilities?Producers of indecent images of children : a qualitative analysis of the aetiology and development of their offending patternsProducers of indecent images of children : a qualitative analysis of the aetiology and development of their offending patternsA comparison of victim and offender perspectives of grooming and sexual abuseA comparison of victim and offender perspectives of grooming and sexual abuseAdolescents in a Digital Everyday EnvironmentAdolescents in a Digital Everyday EnvironmentInternet Sex Crimes Against Minors: The Response of Law Enforcement.Internet Sex Crimes Against Minors: The Response of Law Enforcement.“go on cam but dnt be dirty”: linguistic levels of identity assumption in undercover online operations against child sex abusers“go on cam but dnt be dirty”: linguistic levels of identity assumption in undercover online operations against child sex abusersFighting Child Pornography: A Review of Legal and Technological DevelopmentsFighting Child Pornography: A Review of Legal and Technological DevelopmentsOnline Sex Slaves: The Internet\u27s Powerful Role in Sex TraffickingOnline Sex Slaves: The Internet\u27s Powerful Role in Sex TraffickingThe role of child sexual abuse images in coercive and non-coercive relationships with adolescents:A thematic review of the literatureThe role of child sexual abuse images in coercive and non-coercive relationships with adolescents:A thematic review of the literatureOnline victimization: A report on the nation’s youth.Online victimization: A report on the nation’s youth.The three dimensions of online child pornography offendingThe three dimensions of online child pornography offendingWhat Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?The Internet and Family and Acquaintance Sexual AbuseThe Internet and Family and Acquaintance Sexual AbuseThe Internet and Family and Acquaintance Sexual AbuseThe Internet and Family and Acquaintance Sexual AbuseChild Pornography: Model Legislation & Global ReviewChild Pornography: Model Legislation & Global ReviewThe Internet and Family and Acquaintance Sexual AbuseThe Internet and Family and Acquaintance Sexual AbuseAnnual Research Review: Harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital ageAnnual Research Review: Harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital ageUnited States v. R.V.United States v. R.V.“ cause ur special ”: Understanding trust and complimenting behaviour in online grooming discourse“ cause ur special ”: Understanding trust and complimenting behaviour in online grooming discourseThe SAVE Act of 2015: Congress\u27 Attempt to Reprioritize Online Child Sex TraffickingThe SAVE Act of 2015: Congress\u27 Attempt to Reprioritize Online Child Sex TraffickingChild Sexual Abuse and Exploitation: Guest Editor’s IntroductionChild Sexual Abuse and Exploitation: Guest Editor’s IntroductionU.S./European Summit on Missing & Exploited ChildrenU.S./European Summit on Missing & Exploited ChildrenAnnual research review: harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital ageAnnual research review: harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital ageFighting Child Pornography: A Review of Legal and Technological DevelopmentsFighting Child Pornography: A Review of Legal and Technological DevelopmentsThe Rise of Mobile and the Diffusion of Technology-Facilitated TraffickingThe Rise of Mobile and the Diffusion of Technology-Facilitated TraffickingInterventions for children, youth, and parents to prevent and reduce cyber abuseInterventions for children, youth, and parents to prevent and reduce cyber abuseConceptualising the prevention of child sexual abuseConceptualising the prevention of child sexual abuseOnline risk, harm and vulnerability: reflections on the evidence base for child Internet safety policyOnline risk, harm and vulnerability: reflections on the evidence base for child Internet safety policyFighting Child Pornography: A Review of Legal and Technological DevelopmentsFighting Child Pornography: A Review of Legal and Technological DevelopmentsHigh Tech or High Risk: Moral Panics about Girls OnlineHigh Tech or High Risk: Moral Panics about Girls OnlineResearching Online Child Sexual Exploitation and Abuse:Are There Links Between Online and Offline Vulnerabilities?Researching Online Child Sexual Exploitation and Abuse:Are There Links Between Online and Offline Vulnerabilities?Logistic Models for Classifying Online Grooming Conversation Logistic Models for Classifying Online Grooming Conversation Users of online indecent images of children (IIOC): an investigation into aetiological and perpetuating risk factors, the offending process, the risk of perpetrating a contact sexual offence, and protective factorsUsers of online indecent images of children (IIOC): an investigation into aetiological and perpetuating risk factors, the offending process, the risk of perpetrating a contact sexual offence, and protective factorsAvoiding Online Predators: Proactive Measures Companies Can Take to Protect Their Female ConsumersAvoiding Online Predators: Proactive Measures Companies Can Take to Protect Their Female ConsumersCharacteristics of internet sexual offenders: a reviewCharacteristics of internet sexual offenders: a reviewOnline predatorsOnline predatorsPolicy of European Union on the Safety of Children in Cyber SpacePolicy of European Union on the Safety of Children in Cyber SpaceThe Mechanism of Sex Trafficking and What You Can Do About itThe Mechanism of Sex Trafficking and What You Can Do About itA review of young people's vulnerabilities to online groomingA review of young people's vulnerabilities to online groomingIdentifying vulnerable children online and what strategies can help themIdentifying vulnerable children online and what strategies can help themOnline child sexual abuse imageryOnline child sexual abuse imageryA review of young people's vulnerabilities to online groomingA review of young people's vulnerabilities to online groomingIt's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuseIt's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuseProsecuting Cyber-Pedophiles: How Can Intent Be Shown in a Virtual World in Light of the Fantasy Defense?Prosecuting Cyber-Pedophiles: How Can Intent Be Shown in a Virtual World in Light of the Fantasy Defense?A Qualitative Analysis of Offenders’ Modus Operandi in Sexually Exploitative Interactions With Children OnlineA Qualitative Analysis of Offenders’ Modus Operandi in Sexually Exploitative Interactions With Children OnlineGreek Primary Educators\u27 Perceptions of Strategies for Mitigating Cyber Child ExploitationGreek Primary Educators\u27 Perceptions of Strategies for Mitigating Cyber Child ExploitationBehind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian ChildrenBehind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian ChildrenActual Policing in Virtual Reality - A Cause of Moral Panic or a Justified Need?Actual Policing in Virtual Reality - A Cause of Moral Panic or a Justified Need?Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian ChildrenBehind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian ChildrenEvidence on the extent of harms experienced by children as a result of online risks: Implications for policy and researchEvidence on the extent of harms experienced by children as a result of online risks: Implications for policy and researchSupporting law enforcement in digital communities through natural language analysisSupporting law enforcement in digital communities through natural language analysisProtecting Children Online: Identifying Registered Sex Offenders’ Presence on the Internet and Consequent Online Social BehaviorProtecting Children Online: Identifying Registered Sex Offenders’ Presence on the Internet and Consequent Online Social BehaviorCurrent Perspectives on Violence Against Children in EuropeCurrent Perspectives on Violence Against Children in EuropeThe child pornography crusade and its net-widening effectThe child pornography crusade and its net-widening effectChild-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study.Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study.Online grooming and preventive justiceOnline grooming and preventive justiceChildren's online activities, risks and safety: the UK evidence baseChildren's online activities, risks and safety: the UK evidence baseSolving the Sextortion Puzzle: Piecing Together a Model State Sextortion StatuteSolving the Sextortion Puzzle: Piecing Together a Model State Sextortion Statute‘go on cam but dnt be dirty’: linguistic levels of identity assumption in undercover online operations against child sex abusers‘go on cam but dnt be dirty’: linguistic levels of identity assumption in undercover online operations against child sex abusersKerentanan kanak-kanak Malaysia terhadap pengantunan seksual dalam talianKerentanan kanak-kanak Malaysia terhadap pengantunan seksual dalam talianChild Sexual Abuse, Links to Later Sexual Exploitation/High-Risk Sexual Behavior, and Prevention/Treatment ProgramsChild Sexual Abuse, Links to Later Sexual Exploitation/High-Risk Sexual Behavior, and Prevention/Treatment ProgramsSolving the Sextortion Puzzle: Piecing Together a Model State Sextortion StatuteSolving the Sextortion Puzzle: Piecing Together a Model State Sextortion StatuteResponses to the sexual abuse and sexual exploitation of children in residential care in VictoriaResponses to the sexual abuse and sexual exploitation of children in residential care in VictoriaDifferences between journalistic and academic accounts of child sexual abuse in AustraliaDifferences between journalistic and academic accounts of child sexual abuse in AustraliaExposure to pornography and sexual exploitation of children : an interpretive approachExposure to pornography and sexual exploitation of children : an interpretive approachChild sexual abuse by teachers in secondary schools in the Masvingo District, Zimbabwe : perceptions of selected stakeholdersChild sexual abuse by teachers in secondary schools in the Masvingo District, Zimbabwe : perceptions of selected stakeholdersThe dark side of social media: interviews with exploited teens in East AsiaThe dark side of social media: interviews with exploited teens in East AsiaSituational Prevention of Child Abuse in the New TechnologiesSituational Prevention of Child Abuse in the New TechnologiesWhen Sex and Cell Phones Collide: Inside the Prosecution of a Teen Sexting CaseWhen Sex and Cell Phones Collide: Inside the Prosecution of a Teen Sexting CaseOnline Grooming and Preventive JusticeOnline Grooming and Preventive JusticeChildren’s Online Behaviour and Safety Policy and Rights ChallengesChildren’s Online Behaviour and Safety Policy and Rights ChallengesRomeo and Juliet Online and in Trouble: Criminalizing Depictions of Teen SexualityRomeo and Juliet Online and in Trouble: Criminalizing Depictions of Teen SexualityGood practice guidance for the providers of chat services, instant messaging (im) and internet connectivity content and hostingGood practice guidance for the providers of chat services, instant messaging (im) and internet connectivity content and hostingThe Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex OffendersThe Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex OffendersAssuming identities online:experimental linguistics applied to the policing of online paedophile activityAssuming identities online:experimental linguistics applied to the policing of online paedophile activityBehind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian ChildrenBehind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian ChildrenChild sexual exploitation : definition & guide for professionals: extended textChild sexual exploitation : definition & guide for professionals: extended textInternet-initiated incitement and conspiracy to commit child sexual abuse (CSA): The typology, extent and nature of known casesInternet-initiated incitement and conspiracy to commit child sexual abuse (CSA): The typology, extent and nature of known casesThe Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex OffendersThe Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex OffendersAssuming Identities Online: Experimental Linguistics Applied to the Policing of Online Paedophile ActivityAssuming Identities Online: Experimental Linguistics Applied to the Policing of Online Paedophile ActivityAttempted Enticement of a Minor: No Place for Pedophiles to Hide under 18 U.S.C. 2422(b)Attempted Enticement of a Minor: No Place for Pedophiles to Hide under 18 U.S.C. 2422(b)Kindersekstoeristen: Een literatuurverkenning naar kenmerken, motieven en werkwijzen van (Nederlandse) dadersKindersekstoeristen: Een literatuurverkenning naar kenmerken, motieven en werkwijzen van (Nederlandse) dadersUnderstanding Grooming Discourse in Computer Mediated EnvironmentsUnderstanding Grooming Discourse in Computer Mediated EnvironmentsStrategies and Behaviors of Cyber Deviance and Internet TrollingStrategies and Behaviors of Cyber Deviance and Internet TrollingData on fantasy vs contact driven internet-initiated sexual offences: Study selection, appraisal and characteristicsData on fantasy vs contact driven internet-initiated sexual offences: Study selection, appraisal and characteristicsAssessing parental risk in parenting plan (child custody) evaluation cases involving internet sexual behaviorAssessing parental risk in parenting plan (child custody) evaluation cases involving internet sexual behaviorRegulating the internet in the interests of children: emerging European and international approachesRegulating the internet in the interests of children: emerging European and international approachesThe Commonalities and Shared Experiences of Female Prostitutes Who Were Sexually Exploited as Children: The Perspectives of Clinical Social WorkersThe Commonalities and Shared Experiences of Female Prostitutes Who Were Sexually Exploited as Children: The Perspectives of Clinical Social WorkersIn their own words:young peoples’ vulnerabilities to being groomed and sexually abused onlineIn their own words:young peoples’ vulnerabilities to being groomed and sexually abused online